Patents by Inventor Zhui Deng

Zhui Deng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10685113
    Abstract: In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application, including a binary executable. The computing device can generate function signatures for the functions called within the binary executable. The computing device can generate a locality sensitive hash value for the application based on the function signatures. The computing device can group applications based on the locality sensitive hash value generated for each application. The computing device can compare the function signatures of the binary executables of the applications within a group to determine the similarity of the applications. If two applications have binary executables that are over a threshold percentage of similarity, the two applications can be identified as clones of each other.
    Type: Grant
    Filed: August 14, 2017
    Date of Patent: June 16, 2020
    Assignee: Apple Inc.
    Inventors: Ashish Agarwal, Fei Peng, Zhui Deng
  • Publication number: 20190005242
    Abstract: In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application, including a binary executable. The computing device can generate function signatures for the functions called within the binary executable. The computing device can generate a locality sensitive hash value for the application based on the function signatures. The computing device can group applications based on the locality sensitive hash value generated for each application. The computing device can compare the function signatures of the binary executables of the applications within a group to determine the similarity of the applications. If two applications have binary executables that are over a threshold percentage of similarity, the two applications can be identified as clones of each other.
    Type: Application
    Filed: August 14, 2017
    Publication date: January 3, 2019
    Inventors: Ashish Agarwal, Fei Peng, Zhui Deng
  • Patent number: 9817745
    Abstract: Disclosed is a system and method for setting breakpoints (BPs) that cannot be detected by code being debugged, e.g., to trap transparently at any instruction. The disclosed system and method permits execution tracing and instrumentation of binaries, including malware. The system and method can be used to analyze benign software also, e.g., software obfuscated for anti-reverse-engineering. An invisible breakpoint (IBP) is not detectable by the “guest,” the program being debugged. Hardware virtualization is used to split the code and data views of the program's text segment(s).
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: November 14, 2017
    Assignee: PURDUE RESEARCH FOUNDATION
    Inventors: Xiangyu Zhang, Zhui Deng, Dongyan Xu
  • Publication number: 20160321156
    Abstract: Disclosed is a system and method for setting breakpoints (BPs) that cannot be detected by code being debugged, e.g., to trap transparently at any instruction. The disclosed system and method permits execution tracing and instrumentation of binaries, including malware. The system and method can be used to analyze benign software also, e.g., software obfuscated for anti-reverse-engineering. An invisible breakpoint (IBP) is not detectable by the “guest,” the program being debugged. Hardware virtualization is used to split the code and data views of the program's text segment(s).
    Type: Application
    Filed: January 13, 2015
    Publication date: November 3, 2016
    Applicant: PURDUE RESEARCH FOUNDATION
    Inventors: Xiangyu Zhang, Zhui Deng, Dongyan Xu
  • Publication number: 20160321454
    Abstract: Disclosed is a system and method for removing binary components from machine-language programs or inserting binary components into such programs. The method may include modifying a code sequence of the program (inserting or removing instructions), analyzing the program to determine one or more adjustment(s) to address(es) (of code or data references, direct or indirect) in the program, and modifying operand(s) of one or more instruction(s) in the program to reflect corresponding one(s) of the adjustment(s) (e.g., change offsets or add displacements to register-indirect accesses).
    Type: Application
    Filed: January 13, 2015
    Publication date: November 3, 2016
    Applicant: PURDUE RESEARCH FOUNDATION
    Inventors: Xiangyu Zhang, Zhui Deng, Dongyan Xu